-
Data Security
Aug 05, 2021
Packet Capture: What is it and What You Need to Know
Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.
Robert Grimmick
9 min read
-
Data Security
Aug 05, 2021
How to Investigate NTLM Brute Force Attacks
This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
Ed Lin
6 min read
-
Data Security
Aug 04, 2021
Your Comprehensive Guide to Salesforce Shield
Salesforce Shield provides an excellent suite of tools for Salesforce data security. This guide explains why it might be the right choice for your enterprise security needs.
Renganathan Padmanabhan
4 min read
-
Data Security
Aug 04, 2021
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Threat Modeling and How To Choose the Right Framework
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
Josue Ledesma
5 min read
-
Data Security
Jul 26, 2021
Last Week in Ransomware: Week of July 26th
This week REvil Ransomware had a universal decryption key appear out of thin air and the US has accused China of ProxyLogon.
Michael Raymond
1 min read
-
Data Security
Jul 20, 2021
What is a Brute Force Attack?
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.
Michael Buckbee
4 min read
-
Data Security
Jul 19, 2021
Last Week in Ransomware: Week of July 19th
This past week hasn't seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.
Michael Raymond
2 min read
-
Data Security
Jul 19, 2021
Data Migration Guide: Strategy Success & Best Practices
Wondering what you need to know about data migration? Our guide to success will provide you with all the information you're looking for!
Michael Buckbee
7 min read
-
Data Security
Jul 06, 2021
What is Data Security? Everything You Need to Know
Protect your most valuable asset: your data. Learn what data security is, including key components, technologies and best practices.
Nolan Necoechea
7 min read
-
Data Security
Jun 28, 2021
ReConnect - Meet DatAdvantage Cloud
Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Kilian Englert
1 min read
-
Data Security
Jun 28, 2021
Last Week in Ransomware: Week of June 28th
Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....
Michael Raymond
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital